Return to Article Details Approach to the Construction of Models of Protection of Automated Systems from Unauthorized Access Download Download PDF